Cover Image
市場調查報告書

安全服務的全球市場 (2015∼2019年)

Global Security Services Market 2015-2019

出版商 TechNavio (Infiniti Research Ltd.) 商品編碼 329648
出版日期 內容資訊 英文 99 Pages
訂單完成後即時交付
價格
Back to Top
安全服務的全球市場 (2015∼2019年) Global Security Services Market 2015-2019
出版日期: 2015年05月06日 內容資訊: 英文 99 Pages
簡介

安全服務,是主參數 (資料保護、遵守、架構、電子郵件/Web安全、管治、資料消失防止、ID、存取等) 安全專門化的服務形態。具體的功能為,加密和試驗指標監視、身份識別與存取管理、侵入偵測、漏洞掃描、應用/通訊、安全等。不論大企業和中小企業,政府機關,為了防禦業務上的重要資訊受到不正當訪問和資料盜竊,安全服務的重要度增大。再加上也發揮了從惡意程式和蠕蟲、其他最尖端的威脅之下保護電腦系統的作用。全球安全服務市場2014∼2019年,預計以10.13%的年複合成長率(CAGR) 成長。

本報告提供全球的安全服務市場相關分析、IT安全/威脅概要和市場基本結構、市場規模趨勢 (今後5年的預測值)、 各結構要素 (零組件)、各地區的詳細趨勢、推動、阻礙市場要素與其影響力、主要企業簡介、今後的市場機會等調查、考察。

第1章 摘要整理

第2章 簡稱清單

第3章 調查範圍

  • 市場概要
  • 主要的產品

第4章 市場調查手法

  • 市場調查流程
  • 調查手法

第5章 市場業績概況

第6章 簡介

第7章 市場考察

  • 全球IT安全支出
  • IT安全的必要性
  • 威脅的種類
    • 特洛伊木馬
    • 病毒
    • 蠕蟲
    • 廣告程式
    • 鍵盤側錄程式
    • 後門
    • 漏洞利用
    • 病毒植入程式
    • 釣魚
    • Cookie
    • 藍牙漏洞攻擊
    • 啟動扇區病毒
    • 滑鼠陷阱
    • 綁架瀏覽器
    • 混淆垃圾郵件
    • 犯罪軟體 (Crimeware)
  • IT安全威脅的相關法規

第8章 市場形勢

  • 市場區隔
    • 資安管理服務
    • 安全諮詢服務
    • SaaS安全服務
    • 威脅智能安全服務
  • 市場概要
  • 安全服務的優點

第9章 產品生命週期分析

  • 安全服務的結構要素的產品生命週期分析
  • 全球安全服務市場
  • 波特的五力分析

第10章 市場區隔:各構成要素

  • 全球安全服務市場:各構成要素 (今後6年份)
  • 全球資安管理服務市場
  • 全球安全諮詢服務市場
  • 全球SaaS安全服務市場
  • 全球威脅智能安全服務市場

第11章 地區區分

  • 全球安全服務市場:各地區的變化與預測 (今後6年份)
    • 南北美洲的安全服務市場
    • 歐洲、中東、非洲地區 (EMEA) 的安全服務市場
    • 亞太地區的安全服務市場

第12章 購買標準

第13章 推動市場成長要素

第14章 推動因素與其影響

第15章 市場課題

第16章 推動因素與課題的影響

第17章 市場趨勢

第18章 趨勢與其影響

第19章 業者情勢

  • 競爭模式
    • 主要消息
    • 企業合併、收購 (M&A)
  • 供應商分析

第20章 供應商比較

  • 安全服務的結構要素為基礎的供應商比較
  • 活動地區為基礎供應商比較
  • 其他卓越供應商

第21章 主要供應商分析

  • CA Technologies
    • 主要資料
    • 產業概要
    • 各部門的市場收益額 (最新值)
    • 各部門的市場收益額 (與上年度的比較)
    • 各地區的市場收益額 (最新值)
    • 產業策略
    • 近幾年的發展
    • SWOT分析
  • Deloitte Touche Tohmatsu
  • Emc2
  • IBM
  • PwC
  • Symantec

第22章 前提條件

第23章 相關報告

圖表一覽

目錄
Product Code: IRTNTR5892

About Security Services

Security services focus on the security of key parameters such as data protection, compliance, architecture, email and web security, governance, data loss prevention, and identity and access. They provide features such as encryption, endpoint monitoring, identity and access management, intrusion detection, vulnerability scanning, and application and messaging security. They are gaining importance among large enterprises, government organizations, and SMEs because they provide protection to critical business information from unauthorized access and data theft. In addition, they protect computer systems from malware, worms, and other sophisticated threats.

TechNavio's analysts forecast the global security services market to grow at a CAGR of 10.13% over the period 2014-2019.

Covered in this Report

In this report, Technavio covers the present scenario and growth prospects of the global security services market for the period 2015-2019. To calculate the market size, we considered revenue generated from the sales of the following components:

  • Managed security services
  • Security consulting services
  • SaaS security services

Threat intelligence security services

TechNavio's report, Global Security Services Market 2015-2019, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the Americas, APAC, and EMEA; it also covers the market landscape and its growth prospects in the coming years. The report includes a discussion of the key vendors operating in this market.

Key Regions

  • Americas
  • APAC
  • EMEA

Key Vendors

  • CA Technologies
  • Deloitte Touche Tohmatsu
  • Emc²
  • IBM
  • PwC
  • Symantec

Other Prominent Vendors

  • Accenture
  • Barracuda Networks
  • BT Global Services
  • Check Point Software Technologies
  • Cisco Systems
  • Dell
  • Fortinet
  • Lockheed Martin
  • McAfee
  • Northrop Grumman
  • Palo Alto Networks
  • Webroot Microsoft

Market Driver

  • High Dependence on Internet
  • For a full, detailed list, view our report

Market Challenge

  • Availability of Inexpensive IT Security Solutions
  • For a full, detailed list, view our report

Market Trend

  • High Demand for Cloud-based Security
  • For a full, detailed list, view our report

Key Questions Answered in this Report

  • What will the market size be in 2019 and what will the growth rate be?
  • What are the key market trends?
  • What is driving this market?
  • What are the challenges to market growth?
  • Who are the key vendors in this market space?
  • What are the market opportunities and threats faced by the key vendors?
  • What are the strengths and weaknesses of the key vendors?

Table of Contents

01. Executive Summary

02. List of Abbreviations

03. Scope of the Report

  • 03.1. Market Overview
  • 03.2. Product Offerings

04. Market Research Methodology

  • 04.1. Market Research Process
  • 04.2. Research Methodology

05. Summary of Figures

06. Introduction

07. Market Insights

  • 07.1. Global IT Security Spending
  • 07.2. Need for IT Security
  • 07.3. Types of Threat
    • 07.3.1. Trojan
    • 07.3.2. Virus
    • 07.3.3. Worms
    • 07.3.4. Adware
    • 07.3.5. Keylogger
    • 07.3.6. Backdoor
    • 07.3.7. Exploit
    • 07.3.8. Dropper
    • 07.3.9. Phishing
    • 07.3.10. Cookies
    • 07.3.11. Bluesnarfing
    • 07.3.12. Boot Sector Virus
    • 07.3.13. Mousetrapping
    • 07.3.14. Browser Hijacker
    • 07.3.15. Obfuscated Spam
    • 07.3.16. Crimeware
  • 07.4. Regulations Relating to IT Security Threats

08. Market Landscape

  • 08.1. Market Segmentation
    • 08.1.1. Managed Security Services
    • 08.1.2. Security Consulting Services
    • 08.1.3. SaaS Security Services
    • 08.1.4. Threat Intelligence Security Services
  • 08.2. Market Overview
  • 08.3. Benefits of Security Services

09. Product Lifecycle Analysis

  • 09.1. Product Lifecycle Analysis for Security Service Components
  • 09.2. Global Security Services Market
    • 09.2.1. Market Size and Forecast
  • 09.3. Five Forces Analysis

10. Market Segmentation by Components

  • 10.1. Global Security Services Market by Components 2014-2019
  • 10.2. Global Managed Security Services Market
    • 10.2.1. Market Size and Forecast
  • 10.3. Global Security Consulting Services Market
    • 10.3.1. Market Size and Forecast
  • 10.4. Global SaaS Security Services Market
    • 10.4.1. Market Size and Forecast
  • 10.5. Global Threat Intelligence Security Services Market
    • 10.5.1. Market Size and Forecast

11. Geographical Segmentation

  • 11.1. Global Security Services Market by Geographical Segmentation 2014-2019
    • 11.1.1. Security Services Market in Americas
    • 11.1.2. Security Services Market in EMEA
    • 11.1.3. Security Services Market in APAC

12. Buying Criteria

13. Market Growth Drivers

14. Drivers and their Impact

15. Market Challenges

16. Impact of Drivers and Challenges

17. Market Trends

18. Trends and their Impact

19. Vendor Landscape

  • 19.1. Competitive Scenario
    • 19.1.1. Key News
    • 19.1.2. Mergers and Acquisitions
  • 19.2. Vendor Analysis 2014
    • 19.2.1. Business Strategy of CA Technologies
    • 19.2.2. Business Strategy of Deloitte Touche Tohmatsu
    • 19.2.3. Business Strategy of Emc²
    • 19.2.4. Business Strategy of IBM
    • 19.2.5. Business Strategy of PwC
    • 19.2.6. Business Strategy of Symantec

20. Vendor Comparison

  • 20.1. Comparison of Vendors Based on Security Service Components 2014
  • 20.2. Comparison of Vendors Based on Geographical Presence 2014
  • 20.3. Other Prominent Vendors

21. Key Vendor Analysis

  • 21.1. CA Technologies
    • 21.1.1. Key facts
    • 21.1.2. Business Overview
    • 21.1.3. Business Segmentation by Revenue 2013
    • 21.1.4. Business Segmentation by Revenue 2012 and 2013
    • 21.1.5. Geographical Segmentation by Revenue 2013
    • 21.1.6. Business Strategy
    • 21.1.7. Recent Developments
    • 21.1.8. SWOT Analysis
  • 21.2. Deloitte Touche Tohmatsu
    • 21.2.1. Key Facts
    • 21.2.2. Business Overview
    • 21.2.3. Industry Segmentation
    • 21.2.4. Industry Segmentation by Revenue 2012 and 2013
    • 21.2.5. Geographical Segmentation by Revenue 2013
    • 21.2.6. Business Strategy
    • 21.2.7. Recent Developments
    • 21.2.8. SWOT Analysis
  • 21.3. Emc²
    • 21.3.1. Key Facts
    • 21.3.2. Business Overview
    • 21.3.3. Business Segmentation by Revenue 2013
    • 21.3.4. Business Segmentation by Revenue 2012 and 2013
    • 21.3.5. Geographical Segmentation by Revenue 2013
    • 21.3.6. Business Strategy
    • 21.3.7. Recent Developments
    • 21.3.8. SWOT Analysis
  • 21.4. IBM
    • 21.4.1. Key Facts
    • 21.4.2. Business Description
    • 21.4.3. Business Segmentation
    • 21.4.4. Revenue Segmentation by Business Segment
    • 21.4.5. Revenue Segmentation by Business Operation
    • 21.4.6. Revenue Comparison of Business Segments 2012 and 2013
    • 21.4.7. Revenue Segmentation by Geography
    • 21.4.8. Business Strategy
    • 21.4.9. Key Developments
    • 21.4.10. SWOT Analysis
  • 21.5. PwC
    • 21.5.1. Key Facts
    • 21.5.2. Business Overview
    • 21.5.3. Product Segmentation
    • 21.5.4. Recent Developments
    • 21.5.5. SWOT Analysis
  • 21.6. Symantec
    • 21.6.1. Key Facts
    • 21.6.2. Business Overview
    • 21.6.3. Business Segmentation by Revenue 2013
    • 21.6.4. Business Segmentation by Revenue 2013 and 2014
    • 21.6.5. Geographical Segmentation by Revenue 2013
    • 21.6.6. Business Strategy
    • 21.6.7. Recent Developments
    • 21.6.8. SWOT Analysis

22. Assumptions

23. Other Reports in this Series

List Of Exhibits

  • Exhibit 1: Market Research Methodology
  • Exhibit 2: Summary of Figures of Global Security Services Market by Components
  • Exhibit 3: Global IT Security Spending 2014-2019 ($ billion)
  • Exhibit 4: Segmentation of Global Security Services Market
  • Exhibit 5: Product Lifecycle Analysis for Security Service Components
  • Exhibit 6: Global Security Services Market 2014-2019 ($ billion)
  • Exhibit 7: Global Security Services Market by Components 2014
  • Exhibit 8: Global Security Services Market by Components 2014-2019
  • Exhibit 9: Global Managed Security Services Market 2014-2019 ($ billion)
  • Exhibit 10: Global Security Consulting Services Market 2014-2019 ($ billion)
  • Exhibit 11: Global SaaS Security Services Market 2014-2019 ($ billion)
  • Exhibit 12: Global Threat Intelligence Security Services Market 2014-2019 ($ billion)
  • Exhibit 13: Global Security Services Market by Geographical Segmentation 2014
  • Exhibit 14: Global Security Services Market by Geographical Segmentation 2014-2019
  • Exhibit 15: Global Security Services Market by Geographical Segmentation 2014-2019 ($ billion)
  • Exhibit 16: Comparison of Vendors Based on Security Service Components 2014
  • Exhibit 17: Comparison of Vendors Based on Geographical Presence 2014
  • Exhibit 18: CA Technologies: Business Segmentation by Revenue 2013
  • Exhibit 19: CA Technologies: Business Segmentation by Revenue 2012 and 2013 ($ million)
  • Exhibit 20: CA Technologies: Geographical Segmentation by Revenue 2013
  • Exhibit 21: Deloitte Touche Tohmatsu: Industry Segmentation 2013
  • Exhibit 22: Deloitte Touche Tohmatsu: Industry Segmentation by Revenue 2012 and 2013 ($ million)
  • Exhibit 23: Deloitte Touche Tohmatsu: Geographical Segmentation by Revenue 2013
  • Exhibit 24: Emc²: Business Segmentation by Revenue 2013
  • Exhibit 25: Emc²: Business Segmentation by Revenue 2012 and 2013 ($ million)
  • Exhibit 26: Global Security Services Market: Geographical Segmentation by Revenue 2013
  • Exhibit 27: IBM: Business Segmentation
  • Exhibit 28: IBM: Revenue Segmentation by Business 2013
  • Exhibit 29: IBM: Revenue Segmentation 2013
  • Exhibit 30: IBM: Revenue Comparison of Business Segments 2012 and 2013 ($ million)
  • Exhibit 31: IBM: Revenue Segmentation by Geography 2013
  • Exhibit 32: PwC: Product Segmentation
  • Exhibit 33: Symantec: Business Segmentation by Revenue 2013
  • Exhibit 34: Symantec: Business Segmentation by Revenue 2013 and 2014 ($ million)
  • Exhibit 35: Symantec: Geographical Segmentation by Revenue 2013
Back to Top